Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Tor Adopts New Onion Relay Encryption

November 26, 2025
Reading Time: 3 mins read
in News
FBI Reports 262 Million In Fraud

The Tor network is a global, decentralized system that routes data through thousands of volunteer-operated relays in a multi-hop path, commonly called an onion circuit. Users of the Tor Browser leverage this onion routing—where each of the three hops (entry, middle, and exit relay) adds a layer of encryption—to communicate privately, bypass censorship, and prevent ISP-level tracking. This anonymity is crucial for journalists, dissidents, activists, and generally privacy-conscious individuals, though it is also leveraged by cybercriminals.

The decision to replace tor1 stems from its aging cryptography. Developed when cryptographic standards were less advanced, tor1 presented several security weaknesses that made the network susceptible to modern attacks. This upgrade aims to make the entire circuit traffic more resilient against breaches that could compromise user data and reveal their identity.

One critical flaw in the original tor1 design was its use of AES-CTR encryption without hop-by-hop authentication. This resulted in malleable relay encryption, which meant an attacker controlling multiple relays could modify the traffic between them and observe predictable changes—an internal covert channel attack known as a tagging attack. Furthermore, tor1 offered only partial forward secrecy by reusing the same AES keys for a circuit’s entire lifetime, enabling decryption of all past traffic if those keys were ever stolen. Lastly, tor1 employed a weak 4-byte SHA-1 digest for cell authentication, creating a detectable but non-trivial probability of successful cell forgery.

The new Counter Galois Onion (CGO) design specifically addresses these vulnerabilities. CGO is built on a robust cryptographic construction known as UIV+ and meets modern security requirements, including high tagging resistance and immediate forward secrecy. CGO thwarts tagging attacks by utilizing wide-block encryption and tag chaining, ensuring that any tampering makes the entire current cell and all subsequent cells unrecoverable. For enhanced forward secrecy, CGO updates the encryption keys after every single cell transmission, guaranteeing that the exposure of a current key does not compromise past traffic.

In addition to key and tagging improvements, CGO dramatically strengthens authentication by entirely removing SHA-1 and replacing it with a 16-byte authenticator. CGO also enforces circuit integrity by chaining an encrypted tag and an initial nonce across cells, making each cell’s integrity dependent on all preceding cells. The Tor Project is currently integrating this modern, research-based encryption and authentication system into both the C Tor implementation and its Rust-based client, Arti, though a definitive timeline for its full, default deployment for Tor Browser users has not been provided.

Reference:

  • Tor Switches To Counter Galois Algorithm For Onion Relay Encryption
Tags: Cyber NewsCyber News 2025Cyber threatsNovember 2025
ADVERTISEMENT

Related Posts

FBI Reports 262 Million In Fraud

Crime Rings Use Hackers To Hijack Trucks

November 26, 2025
FBI Reports 262 Million In Fraud

FBI Reports 262 Million In Fraud

November 26, 2025
Cryptographers Void Election After Key Loss

CrowdStrike Insider Aids False Hack Claim

November 25, 2025
Cryptographers Void Election After Key Loss

Porch Pirates Steal Electronics In Towns

November 25, 2025
Cryptographers Void Election After Key Loss

Cryptographers Void Election After Key Loss

November 25, 2025
Cox Confirms Oracle Hack As Victims Named

Google Adds AirDrop Support To Android

November 24, 2025

Latest Alerts

JackFix Spreads Stealers Via Fake Updates

RomCom Uses Fake Updates To Spread Malware

Chrome Addon Injects Hidden Solana Fees

Formatters Leak Thousands Of Secrets

Second Wave Hits Thousands Of Repos

CISA Highlights Ongoing Spyware Campaign

Subscribe to our newsletter

    Latest Incidents

    Exchange Online Outage Blocks Mail

    CodeRED Cyberattack Disrupts Alerts

    Hacker Takes Over Houston Radio Airwaves

    Canon Subsidiary Hit By Oracle Hack

    Harvard Reports Significant Data Breach

    Dartmouth Confirms Major Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial